Recent Security News

  • Leveraging Wazuh to combat insider threats

    November 27, 2023 at 10:04AM Insider threats refer to the risk of authorized individuals with access to an organization’s systems or sensitive information exploiting that access in malicious ways, such as data theft, sabotage, unauthorized access, or introducing malware. Detecting and preventing such threats can be challenging because perpetrators often have legitimate credentials. Effective strategies…

    Read More

  • Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

    November 27, 2023 at 10:04AM Global data privacy laws aim to protect consumer personal data, but recent data breaches highlight ongoing vulnerabilities. One potential reason for this is the delicate balance that companies must strike between protecting privacy, maintaining product efficacy, and mitigating cyber breaches. Data de-identification, a key safeguard measure, is necessary, but full…

    Read More

  • Google Drive users angry over losing months of stored data

    November 27, 2023 at 09:57AM Recent files stored in Google Drive have disappeared for some users, with the service reverting to a storage snapshot from April-May 2023. Users have reported losing recent data and folder structure changes, and Google’s support team is investigating the issue but has not provided an estimated fix time. Users are…

    Read More

  • New Rust-based SysJoker backdoor linked to Hamas hackers

    November 27, 2023 at 09:57AM Recently, a new variant of the multi-platform malware called ‘SysJoker’ has been discovered. It has undergone a complete code rewrite in the Rust programming language. This malware, initially documented in early 2022, operates on Windows, Linux, and macOS systems. The new variant has been linked to ‘Operation Electric Powder,’ believed…

    Read More

  • Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

    November 27, 2023 at 08:30AM Passive network attackers can obtain private RSA host keys from a vulnerable SSH server by observing computational faults during connection establishment, according to a new study. These attackers can then intercept sensitive data and conduct adversary-in-the-middle attacks. The research highlights the importance of encrypting protocol handshakes, binding authentication to sessions,…

    Read More